Re: 2.2.13 oopsen

Simon Kirby (sim@stormix.com)
Sat, 6 Nov 1999 12:06:13 -0500


Oopses in find_buffer are usually a sign of bad memory. You may want to
try my memory tester at ftp://blue.netnation.com/pub/memtest.c , or try
an improved version here:

http://www.qcc.sk.ca/~charlesc/software/memtester/

If either versions find an error, there is a problem somewhere. Let me
know which version finds the error for you (I'm interested to see how
well Charles' improvements work :)).

You said you had 256 MB of ram, so you'll probably want to run the
program with "220" or so as an argument (so that you still have some
memory left). This program doesn't test everything (just the RAM that
the kernel maps to it), but it has worked for me pretty well in the past
and has usually been much faster than professional testers.

Simon-

[ Stormix Technologies Inc. ][ NetNation Communcations Inc. ]
[ sim@stormix.com ][ sim@netnation.com ]
[ Opinions expressed are not necessarily those of my employers. ]

---
On Sat, Nov 06, 1999 at 12:03:06PM +0000, Alex Buell wrote:

> Hi guys, > > Whilst burning a CD, 2.2.13 oopsed twice. Here's the decoded output from > ksymoops: > > >>EIP: c012a186 <find_buffer+2a/44> > Trace: c012a1bd <get_hash_table+1d/2c> > Trace: c012aeff <brw_page+e7/364> > Trace: c012af4b <brw_page+133/364> > Trace: c010b7e8 <enable_irq+48/7c> > Trace: c012b25c <generic_readpage+8c/9c> > Trace: c010fcf1 <smp_apic_timer_interrupt+d/20> > Trace: c011fd3c <try_to_read_ahead+100/118> > Trace: c011fc6b <try_to_read_ahead+2f/118> > Trace: c01289ea <sys_read+c6/f8> > Code: c012a186 <find_buffer+2a/44> 00000000 <_EIP>: <=== > Code: c012a186 <find_buffer+2a/44> 0: 8b 12 mov (%edx),%edx <=== > Code: c012a188 <find_buffer+2c/44> 2: 39 58 04 cmp %ebx,0x4(%eax) > Code: c012a18b <find_buffer+2f/44> 5: 75 f3 jne c012a180 <find_buffer+24/44> > Code: c012a18d <find_buffer+31/44> 7: 39 70 08 cmp %esi,0x8(%eax) > Code: c012a190 <find_buffer+34/44> a: 75 ee jne c012a180 <find_buffer+24/44> > Code: c012a192 <find_buffer+36/44> c: 66 39 48 0c cmp %cx,0xc(%eax) > Code: c012a196 <find_buffer+3a/44> 10: 75 e8 jne c012a180 <find_buffer+24/44> > Code: c012a198 <find_buffer+3c/44> 12: 89 c2 mov %eax,%edx > > Nov 6 11:50:19 tahallah kernel: Unable to handle kernel paging request at virtual address e6a4e016 > Nov 6 11:50:19 tahallah kernel: current->tss.cr3 = 022b7000, %cr3 = 022b7000 > Nov 6 11:50:19 tahallah kernel: *pde = 00000000 > Nov 6 11:50:19 tahallah kernel: Oops: 0000 > Nov 6 11:50:19 tahallah kernel: CPU: 0 > Nov 6 11:50:19 tahallah kernel: EIP: 0010:[<c012a186>] > Nov 6 11:50:19 tahallah kernel: EFLAGS: 00010282 > Nov 6 11:50:19 tahallah kernel: eax: e6a4e016 ebx: 00231b02 ecx: 00000305 edx: e6a4e016 > Nov 6 11:50:19 tahallah kernel: esi: 00000400 edi: 00000000 ebp: 00000100 esp: c6de3dc0 > Nov 6 11:50:19 tahallah kernel: ds: 0018 es: 0018 ss: 0018 > Nov 6 11:50:19 tahallah kernel: Process cdrecord (pid: 18470, process nr: 25, stackpage=c6de3000) > Nov 6 11:50:19 tahallah kernel: Stack: c012a1bd 00000305 00231b02 00000400 c012aeff c4bf3660 00000305 00231b02 > Nov 6 11:50:19 tahallah kernel: c012af4b 00000305 00231b02 00000400 c010b7e8 00003894 ca1da880 00000000 > Nov 6 11:50:19 tahallah kernel: c6de3e94 00000305 00000002 c95df380 00000000 c95df380 c95df200 00000400 > Nov 6 11:50:19 tahallah kernel: Call Trace: [<c012a1bd>] [<c012aeff>] [<c012af4b>] [<c010b7e8>] [<c012b25c>] [<c011fd3c>] [<c011fc6b>] > Nov 6 11:50:19 tahallah kernel: [<c0120114>] [<c01130ed>] [<c01204bb>] [<c0120410>] [<c0112a94>] [<c01289ea>] [<c01091e4>] [<c010002b>] > Nov 6 11:50:19 tahallah kernel: Code: 8b 12 39 58 04 75 f3 39 70 08 75 ee 66 39 48 0c 75 e8 89 c2 > > >>EIP: c012a186 <find_buffer+2a/44> > Trace: c012a1bd <get_hash_table+1d/2c> > Trace: c012aeff <brw_page+e7/364> > Trace: c012af4b <brw_page+133/364> > Trace: c010b7e8 <enable_irq+48/7c> > Trace: c012b25c <generic_readpage+8c/9c> > Trace: c011fd3c <try_to_read_ahead+100/118> > Trace: c011fc6b <try_to_read_ahead+2f/118> > Trace: c0120114 <do_generic_file_read+29c/598> > Code: c012a186 <find_buffer+2a/44> 00000000 <_EIP>: <=== > Code: c012a186 <find_buffer+2a/44> 0: 8b 12 mov (%edx),%edx <=== > Code: c012a188 <find_buffer+2c/44> 2: 39 58 04 cmp %ebx,0x4(%eax) > Code: c012a18b <find_buffer+2f/44> 5: 75 f3 jne c012a180 <find_buffer+24/44> > Code: c012a18d <find_buffer+31/44> 7: 39 70 08 cmp %esi,0x8(%eax) > Code: c012a190 <find_buffer+34/44> a: 75 ee jne c012a180 <find_buffer+24/44> > Code: c012a192 <find_buffer+36/44> c: 66 39 48 0c cmp %cx,0xc(%eax) > Code: c012a196 <find_buffer+3a/44> 10: 75 e8 jne c012a180 <find_buffer+24/44> > Code: c012a198 <find_buffer+3c/44> 12: 89 c2 mov %eax,%edx > > System configuration: > Linux tahallah 2.2.13 #39 SMP Thu Oct 21 20:28:17 BST 1999 i686 > Kernel modules 2.3.6 > Gnu C 2.95.1 > Binutils 2.9.5.0.16 > Linux C Library 2.1.2 > Dynamic linker ldd (GNU libc) 2.1.2 > Linux C++ Library 2.8.1 > Procps 2.0.5 > Mount 2.8 > Net-tools 1.52 > Kbd 0.99 > Sh-utils 2.0 > Modules Loaded serial ide-scsi nls_iso8859-1 vfat nls_cp437 msdos fat > > Machine is dual Pentium Pros @ 166MHz (never overclocked), with 256MB of > memory. This has happened several times in the past, noone bothered to > respond. > > I've now got two buggered CDs that I have to throw away. > > Is there anything else you'd like me to show you? > > Cheers, > Alex > -- > > Legalise cannabis today! Got GnuPG? Ask me for public key. > > http://www.tahallah.demon.co.uk - updated! > > > - > To unsubscribe from this list: send the line "unsubscribe linux-kernel" in > the body of a message to majordomo@vger.rutgers.edu > Please read the FAQ at http://www.tux.org/lkml/

- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.rutgers.edu Please read the FAQ at http://www.tux.org/lkml/